General

  • Target

    ORDER-2030213F.pdf_1.xz

  • Size

    7KB

  • Sample

    230216-s1cgfahh6w

  • MD5

    6e8a235f56282c5c14e483aaec9d6bba

  • SHA1

    31c1a6e9245fd4db9a4850fbf6c1a06cb94bdb7a

  • SHA256

    e73d13af5cc2005fe0edf474cdddc09d56802e6a5dfe6120ce79299e9ef44d95

  • SHA512

    831d39996141cdf541a4d2efd2ff03d86289518bddfdd1d3c9eb6a4504d2471eeea4c108b249c0d8e63989c7ebb2789e5479b9872c31ee7a8ba82743368fda28

  • SSDEEP

    192:69KsNvUnMw9N2RuoyXbGSiwVdWkppIw3O0V1BZ:8XWLkuoyXbNzVd/pD9v

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Targets

    • Target

      ORDER-2030213F.vbs

    • Size

      227KB

    • MD5

      cfd1f9bddf2a1aac9386621f2df068d5

    • SHA1

      abb692951d21f1820583716dd324de928dfd9b6b

    • SHA256

      164d4f5ae08f512aa6341b37bf57d32bc471415185c63dd175e88a35626b20b6

    • SHA512

      220b962cee21fcbc4049e2a98a2d5cd798820b6be0b5db678d041c7b3a35ce1f2ec0628d770ec812dbb98edccf138d8b3906cf6dd8fbdb4b217b372faf6e3e9f

    • SSDEEP

      768:xMbGEQhUfQB8/UgFcxgfcdVH5xOnxWzi6R/6Y6oHDHrL1V0:WB

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks